He / They

  • 26 Posts
  • 1.48K Comments
Joined 1 year ago
cake
Cake day: June 16th, 2023

help-circle







  • Speaking as an infosec professional, security monitoring software should be targeted at threats, not at the user. We want to know the state of the laptop as it relates to the safety of the data on that machine. We don’t, and in healthy workplaces can’t, determine what an employee is doing that does not behaviorally conform to a threat.

    Yes, if a user repeatedly gets virus detections around 9pm, we can infer what’s going on, but we aren’t tracking their websites visited, because the AUP is structured around impacts/outcomes, not actions alone.

    As an example, we don’t care if you run a python exploit, we care if you run it against a machine you do not have authorization to (i.e. violating CFAA). So we don’t scan your files against exploitdb, we watch for unusual network traffic that conforms to known exploits, and capture that request information.

    So if you try to pentest pornhub, we’ll know. But if you just visit it in Firefox, we won’t.

    We’re not prison guards, like these schools apparently think they are, we’re town guards.







  • I think you want Roots of Pacha.

    Contribution is a currency used in Roots of Pacha. When the player donates food or supplies to the clan, contribution points are awarded as acknowledgement of their efforts.

    Contribution points must be expended to develop ideas. Certain clan members have items for trade in exchange for points, as well.

    Items are donated by placing them in the contribution bin, found just north of the bonfire. Donated items may be viewed and retrieved until the end of the day. The value of the contributions is tallied overnight and the bin is emptied for the next day.

    It’s not just a rename of money, it’s more like your social renown in the village, like how much people respect you because of your contributions, and you use it mostly to choose what improvement project you want to build next in the village.